-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
executable file
·1787 lines (1504 loc) · 127 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE html>
<html lang="en" ng-app="app">
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="initial-scale=0.7, maximum-scale=1">
<meta name="description" content="">
<meta name="author" content="">
<title>Securi-Tay V</title>
<!-- Bootstrap Core CSS -->
<link rel="stylesheet" href="css/bootstrap.min.css" type="text/css">
<!-- Custom Fonts -->
<link href='https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,200,400,300,600,700,800' rel='stylesheet' type='text/css'>
<link href='https://fonts.googleapis.com/css?family=Merriweather:400,300,300italic,400italic,700,700italic,900,900italic' rel='stylesheet' type='text/css'>
<link rel="stylesheet" href="font-awesome/css/font-awesome.min.css" type="text/css">
<!-- Custom CSS -->
<link rel="stylesheet" href="./css/creative.css" type="text/css">
<!-- Favicon code -->
<link rel="apple-touch-icon-precomposed" sizes="57x57" href="img/favicons/apple-touch-icon-57x57.png" />
<link rel="apple-touch-icon-precomposed" sizes="114x114" href="img/favicons/apple-touch-icon-114x114.png" />
<link rel="apple-touch-icon-precomposed" sizes="72x72" href="img/favicons/apple-touch-icon-72x72.png" />
<link rel="apple-touch-icon-precomposed" sizes="144x144" href="img/favicons/apple-touch-icon-144x144.png" />
<link rel="apple-touch-icon-precomposed" sizes="60x60" href="img/favicons/apple-touch-icon-60x60.png" />
<link rel="apple-touch-icon-precomposed" sizes="120x120" href="img/favicons/apple-touch-icon-120x120.png" />
<link rel="apple-touch-icon-precomposed" sizes="76x76" href="img/favicons/apple-touch-icon-76x76.png" />
<link rel="apple-touch-icon-precomposed" sizes="152x152" href="img/favicons/apple-touch-icon-152x152.png" />
<link rel="icon" type="image/png" href="img/favicons/favicon-196x196.png" sizes="196x196" />
<link rel="icon" type="image/png" href="img/favicons/favicon-96x96.png" sizes="96x96" />
<link rel="icon" type="image/png" href="img/favicons/favicon-32x32.png" sizes="32x32" />
<link rel="icon" type="image/png" href="img/favicons/favicon-16x16.png" sizes="16x16" />
<link rel="icon" type="image/png" href="img/favicons/favicon-128.png" sizes="128x128" />
<meta name="application-name" content="Securi-Tay V"/>
<meta name="msapplication-TileColor" content="#FFFFFF" />
<meta name="msapplication-TileImage" content="img/favicons/mstile-144x144.png" />
<meta name="msapplication-square70x70logo" content="img/favicons/mstile-70x70.png" />
<meta name="msapplication-square150x150logo" content="img/favicons/mstile-150x150.png" />
<meta name="msapplication-wide310x150logo" content="img/favicons/mstile-310x150.png" />
<meta name="msapplication-square310x310logo" content="img/favicons/mstile-310x310.png" />
<!-- Coloured application bars -->
<!-- Chrome, Firefox OS and Opera -->
<meta name="theme-color" content="#682d8c">
<!-- Windows Phone -->
<meta name="msapplication-navbutton-color" content="#682d8c">
<!-- iOS Safari -->
<meta name="apple-mobile-web-app-status-bar-style" content="#682d8c">
<!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!-- WARNING: Respond.js doesn't work if you view the page via file:// -->
<!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
<![endif]-->
</head>
<body id="page-top">
<!-- ************************** --
-- Site Design by Adam Rapley --
-- www.adamrapley.com --
-- ************************** -->
<nav id="mainNav" class="navbar navbar-default navbar-fixed-top">
<div class="container-fluid">
<!-- Brand and toggle get grouped for better mobile display -->
<div class="navbar-header">
<button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#bs-example-navbar-collapse-1">
<span class="sr-only">Toggle navigation</span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
<a class="navbar-brand page-scroll" href="#page-top"><img class="brandlogo" src="img/ehslogoblackbgfill.png"></a>
</div>
<!-- Collect the nav links, forms, and other content for toggling -->
<div class="collapse navbar-collapse" id="bs-example-navbar-collapse-1">
<ul class="nav navbar-nav navbar-right pull-right">
<li>
<a class="page-scroll" href="#about">About</a>
</li>
<li>
<a class="page-scroll" href="#sponsors">Sponsors</a>
</li>
<li>
<a class="page-scroll" href="#program">Schedule</a>
</li>
<li>
<a class="page-scroll" href="#tickets">Tickets</a>
</li>
</ul>
</div>
<!-- /.navbar-collapse -->
</div>
<!-- /.container-fluid -->
</nav>
<header>
<div class="header-content">
<div class="header-content-inner">
<!-- Hero image used under CC BY-NC-ND 4.0
Original image by Tim Haynes 2013 and found here:
http://soc.sty.nu/2014/12/bright-light-city/ -->
<img src="img/webwhitelegit.png" class="" id="logo" />
</div>
</div>
</header>
<section class="bg-primary" id="about">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2 text-center">
<h2 class="section-heading">It's time...</h2>
<hr class="light">
<p class="text-faded">Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University. After the sell-out success of Securi-Tay IV this year’s event will run over two days, Friday 26th and Saturday 27th of February.
The conference will be held in Abertay University, benefiting from the fantastic transport links to Dundee.
As well as transport, Dundee benefits from affordable accommodation in the city centre, as well as a thriving technology community and the reputation for being Scotland’s sunniest city.</p>
<p class="text-faded">
The conference is aimed at anyone with an interest in Hacking and Information Security. You don’t need to be a l33t h4x0r to attend and enjoy the event: Securi-Tay V promises to provide a fantastic, worthwhile experience for everyone, new to the scene and conference veteran alike.
Both days will feature talks from industry professionals and students as well as some workshops.
Lunch will be provided both days and an evening buffet will be provided in the bar after the event on day one. </p>
</div>
</div>
</div>
</section>
<section class="no-padding" id="sponsors">
<div class="container-fluid">
<div class="col-lg-8 col-lg-offset-2 text-center">
<h2 class="section-heading">Sponsors</h2>
<hr class="light">
</div>
<div class="row no-gutter">
<div class="col-lg-6 col-sm-6">
<div class="portfolio-box pb1">
<a href="#ncc">
<div class="portfolio-box-caption" data-toggle="modal" data-target="#ncc">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Gold Sponsor
</div>
<div class="company-name">
NCC Group
</div>
</div>
</div>
</a>
<div class="modal fade" id="ncc" tabindex="-1" role="dialog" aria-labelledby="Gold Sponsor - NCC Group">
<div class="modal-dialog" role="document">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button>
<h4 class="modal-title" id="myModalLabel">NCC Group</h4>
</div>
<div class="modal-body">
NCC Group is a global expert in cyber security and risk mitigation, working with businesses to protect their brand, value and reputation against the ever-evolving threat landscape. A FTSE 250 listed company, the Group is a trusted advisor to more than 15,000 clients worldwide. Headquartered in Manchester, UK, with 32 offices across the world, the Group employs more than 1,750 specialists in information security, assurance and technology. Through a unique range of services, the company helps organisations to prepare for and respond to cyber threats. It provides organisations with peace of mind that that their most important assets are protected, available and operating as they should be at all times.
<br /><br />
Follow us on twitter: <a href="https://twitter.com/NCCGroupCareers" target="_blank">@NCCGroupCareers</a>
<br /><br />
<i class="fa fa-globe"></i> <a href="https://nccgroup.trust" target="_blank">nccgroup.trust</a>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-6 col-sm-6">
<div class="portfolio-box pb2">
<a href="#tenable">
<div class="portfolio-box-caption" data-toggle="modal" data-target="#tenable">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Gold Sponsor
</div>
<div class="company-name">
Tenable
</div>
</div>
</div>
</a>
<div class="modal fade" id="tenable" tabindex="-1" role="dialog" aria-labelledby="Gold Sponsor - Tenable">
<div class="modal-dialog" role="document">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button>
<h4 class="modal-title" id="myModalLabel">Tenable</h4>
</div>
<div class="modal-body">
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View, which provides the most comprehensive and integrated view of network health, and Nessus, the global standard in detecting and assessing network data.
<br /><br />
Tenable identifies all types of risk on the network including missing patches, malware and intruders, missing configurations and missing monitoring. Our products reach across cloud, virtual, mobile and traditional IT systems.
<br /><br />
Tenable is relied upon by many of the world's largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense.
<br /><br />
<i class="fa fa-globe"></i> <a href="https://tenable.com" target="_blank">tenable.com</a>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<hr class="sponsor-split" />
<div class="row no-gutter">
<div class="col-lg-6 col-sm-6 col-lg-offset-3 col-sm-offset-3">
<div class="portfolio-box pb3">
<a href="#portcullis">
<div class="portfolio-box-caption" data-toggle="modal" data-target="#portcullis">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Afterparty Sponsor
</div>
<div class="company-name">
Portcullis
</div>
</div>
</div>
</a>
<div class="modal fade" id="portcullis" tabindex="-1" role="dialog" aria-labelledby="Afterparty Sponsor - Portcullis">
<div class="modal-dialog" role="document">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button>
<h4 class="modal-title" id="myModalLabel">Portcullis</h4>
</div>
<div class="modal-body">
Portcullis are a widely recognised provider of Information Security Services. Our key portfolio covers four main disciplines, security testing, digital forensics, cyber defence and security consultancy services. Established in 1986 Portcullis has seen and felt the benefit from conferences and better education surrounding our industry.
<br /><br/>
Securi-Tay is a great opportunity to get involved in our industry talks and learn more about information security. Today Portcullis is in the proud position of employing one of the largest multi discipline information security resources in the UK. We are happy to be sponsoring Securi-tay for a second year, we are more than happy to support the next generation of our industry in expanding their knowledge and challenging ideas.
<br /><br />
<i class="fa fa-globe"></i> <a href="https://www.portcullis-security.com/" target="_blank">portcullis-security.com</a>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<hr class="sponsor-split" />
<div class="row no-gutter">
<div class="col-lg-4 col-sm-4">
<div class="portfolio-box pb4">
<a href="#pentest">
<div class="portfolio-box-caption" data-toggle="modal" data-target="#pentest">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Silver Sponsor
</div>
<div class="company-name">
Pentest Limited
</div>
</div>
</div>
</a>
<div class="modal fade" id="pentest" tabindex="-1" role="dialog" aria-labelledby="Silver Sponsor - Pentest Limited">
<div class="modal-dialog" role="document">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button>
<h4 class="modal-title" id="myModalLabel">Pentest Limited</h4>
</div>
<div class="modal-body">
Pentest Limited is a Manchester-based penetration testing firm specialising in Application Security. Formed in 2001, Pentest focused on Application Security from the start and now employ one of the largest teams of Application Security specialists. As experts in our field, we are in the very fortunate position of working with a wide range of clients, from multi-national blue-chips to niche technology pioneers, allowing our testers to work on interesting, varied and challenging projects, for clients who genuinely care about security.
<br /><br />
Pentest are delighted to be sponsoring Securi-Tay V and hope many of you will attempt our latest Hacking Challenge.
<br /><br />
<i class="fa fa-globe"></i> <a href="http://www.pentest.co.uk/" target="_blank">pentest.co.uk</a>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-4 col-sm-4">
<div class="portfolio-box pb5">
<a href="#bt">
<div class="portfolio-box-caption" data-toggle="modal" data-target="#bt">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Silver Sponsor
</div>
<div class="company-name">
BT
</div>
</div>
</div>
</a>
<div class="modal fade" id="bt" tabindex="-1" role="dialog" aria-labelledby="Silver Sponsor - BT">
<div class="modal-dialog" role="document">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button>
<h4 class="modal-title" id="myModalLabel">BT</h4>
</div>
<div class="modal-body">
BT Security provides managed security services to some of the worlds most important organisations, as well as ensuring BTs own operations are secure. We are a rapidly growing organisation and are always on the look-out for great people who can grow and develop as we do.
<br /><br />
<i class="fa fa-globe"></i> <a href="https://home.bt.com/" target="_blank">home.bt.com</a>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-4 col-sm-4">
<div class="portfolio-box pb6">
<a href="#context">
<div class="portfolio-box-caption" data-toggle="modal" data-target="#context">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Silver Sponsor
</div>
<div class="company-name">
Context IS
</div>
</div>
</div>
</a>
<div class="modal fade" id="context" tabindex="-1" role="dialog" aria-labelledby="Silver Sponsor - Context IS">
<div class="modal-dialog" role="document">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button>
<h4 class="modal-title" id="myModalLabel">Context IS</h4>
</div>
<div class="modal-body">
Context is an independently managed cyber security consultancy, founded in 1998. Our broad service portfolio covers the areas of security penetration testing and assurance, incident response and investigations, and technical security research.
<br /><br />
We are certified by CESG and CPNI for the Cyber Incident Response scheme and we helped to establish CREST and its associated standards.
<br /><br />
Our consultants are regularly invited to present at global events such as Black Hat Vegas, Hack in the Box and 44CON.
<br /><br />
<i class="fa fa-globe"></i> <a href="http://www.contextis.com" target="_blank">contextis.com</a>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<hr class="sponsor-split" />
<div class="row no-gutter">
<div class="col-lg-3 col-sm-3 col-lg-offset-3 col-sm-offset-3">
<div class="portfolio-box pb7">
<a href="https://www.mwrinfosecurity.com/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Bronze Sponsor
</div>
<div class="company-name">
MWR InfoSecurity
</div>
</div>
</div>
</a>
</div>
</div>
<div class="col-lg-3 col-sm-3">
<div class="portfolio-box pb8">
<a href="http://www.abertay.ac.uk" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Bronze Sponsor
</div>
<div class="company-name">
Abertay University
</div>
</div>
</div>
</a>
</div>
</div>
</div>
</div>
</section>
<section id="program">
<div class="container">
<div class="row">
<div class="col-lg-12 text-center">
<h2 class="section-heading">Schedule</h2>
<hr class="primary">
<p class="text-faded">We're happy to announce the schedule for both days of the conference is now available!</p>
<p class="text-faded">The talk schedule is now available as an <a href="assets/Securi-Tay.ics" target="_blank">.ics</a> file!</p>
<!-- SCHEDULE TAB -->
<ul id="myTab" class="nav nav-tabs" role="tablist">
<li role="presentation" class=""><a href="#day1" id="day1-tab" role="tab" data-toggle="tab" aria-controls="day1" aria-expanded="false">Day 1</a></li>
<li role="presentation" class="active"><a href="#day2" role="tab" id="day2-tab" data-toggle="tab" aria-controls="day2" aria-expanded="true">Day 2</a></li>
</ul>
<!-- CONTENT -->
<div id="myTabContent" class="tab-content">
<!-- DAY 1 -->
<div role="tabpanel" class="tab-pane fade in" id="day1" aria-labelledby="day1-tab">
<div class="panel-group" id="accordion1" role="tablist" aria-multiselectable="true">
<!-- 9-00 TIMESTAMP -->
<div class="shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">9-00</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#Registration" aria-expanded="true" aria-controls="Registration">
Registration
</a>
</h4>
</div>
</div>
</div>
<div id="Registration" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p class="speaker-name uppercase">Welcome!</p>
<p>Meet us in the foyer of Abertay University and sign in!<br/>There's also free stuff!</p>
<p class="abstract">The first 100 people to arrive will get a free bacon roll! (or veggie alternative)</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Foyer</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 10-00 TIMESTAMP -->
<div class="row shed-row-item shed-dark">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">10-00</p>
</div>
<!-- T1/2 NCC Keynote -->
<div class="panel shed-dark panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#NCCKey" aria-expanded="true" aria-controls="NCCKeynote">
NCC Keynote
</a>
</h4>
</div>
</div>
</div>
<div id="NCCKey" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p class="abstract">With worldwide iPhone sales hitting 700 million units worldwide they
form 40% of the smartphone market and are the most used phone in the
enterprise. Due to the large number of people using Smart phones there
is a growing need for mobile forensics. Forensic Analysts are
increasingly finding mobile phones to contain a wealth of digital
information that includes phone call metadata, Geo locations, SMS
messages, digital messages, social media data and much more. This talk
will guide you through the process of device acquisition, removing
data with and without a user’s pin and the use of the Lockdown
certificate. This talk will also cover how data stored locally and in
the cloud can be used to gain a full image of a device and data
removed for investigation. Details of how to protect IOS devices from
this will also be provided. It is becoming increasingly difficult for
security services to extract data from devices so they are now
employing methods used by forensics in addition to their own in order
to retrieve the necessary information.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="primary" />
</div>
<div class="col-lg-3 col-md-3 col-sm-11">
<h5>About Derek Price</h5>
<p class="small">Bio coming soon!</p>
<span class="about-speaker"><i class="fa fa-lg fa-globe"></i> <a class="small" href="https://nccgroup.trust/" target="_blank">nccgroup.trust</a></span>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 11-00 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">11-00</p>
</div>
<!-- T1 Snowden -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#Snowden" aria-expanded="true" aria-controls="Snowden">
Post-Snowden Communication - An Analysis of Secure Mobile Messengers
</a>
</h4>
</div>
</div>
</div>
<div id="Snowden" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Snowden Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">The leaks of Edward Snowden made clear, that intelligence agencies like the NSA are interested in our private conversations. Many people switched to so called “secure messengers” which provide end-to- end encrypted messages which nobody except the sender and the receiver can read. This talk will focus on the security of state of the art secure messengers like Signal, Telegram and Line. We will present theoretical attack vectors as well as practical attacks on some of them like a man-in- the-middle attack on Signal (without SSL certificate pinning). Other attacks will be about attacking local storage, account hijacking possibilities and user enumeration. This talk also covers a comparison between those secure messengers and other messengers like WhatsApp. Elaborating better ways to implement countermeasures against such theoretical and practical attacks, which sometimes are still working, was also part of this research.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin"/>
<h5>About David Wind & Christoph Rottermanner</h5>
<p class="small">We are from Austria and we are currently studying in the first Semester Master Information Security at the University of Applied Science in St. Pölten. Before starting the master study, we finished the bachelor at the same university in IT Security. Since one year we work for a company called XSEC (Cross-Sec) in Vienna and mainly perform security audits (penetration tests) of web-applications. David wrote a thesis about man-in-the-middle attacks on TextSecure while Christoph wrote a thesis about secure messaging in general. We both gave a talk about secure messengers this year on international conferences. We are both interested in cryptography and we care about privacy. Thats why we like to encrypt all the things.</p>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#Cash" aria-expanded="true" aria-controls="Cash">
Sorry, we’re cash only
</a>
</h4>
</div>
</div>
</div>
<div id="Cash" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">We are surrounded by card payments as a part of buying groceries or paying our monthly bills. As much as we hope these payment methods are safe, their inherent complexity as a result of decades of backwards compatibility leads to insecurity instead.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin"/>
<h5>About Henri Watson</h5>
<p class="small">Born in California and raised in the Dominican Republic, Henri is a backend web developer who was pushed to payments technologies after observing electronic payments slowly regain a major role in a developing nation that had previously been affected by wide-scale corruption across the finance industry.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 12-00 TIMESTAMP -->
<div class="shed-dark shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">12-00</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel shed-dark panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#lunchone" aria-expanded="true" aria-controls="LunchOne">
Lunch
</a>
</h4>
</div>
</div>
</div>
<div id="lunchone" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p>Hop over the road to Abertay Student Union for a bite to eat before the afternoon talks.<br /> Oh, lunch is provided as well by the way!</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">45 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Foyer</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 12-45 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">12-45</p>
</div>
<!-- T2 Cash Only -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#passwords" aria-expanded="true" aria-controls="AppCL">
Teach your brain to regenerate passwords instead of remembering them!
</a>
</h4>
</div>
</div>
</div>
<div id="passwords" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Abstract coming soon...</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin"/>
<h5>About Grigorios Fragkos</h5>
<p class="small">Dr. Grigorios Fragkos (VP CyberSecurity at Sysnet Global Solutions) is responsible for the ensuring the security of mission critical systems offered by Sysnet to a wide range of high profile clients. Grigorios (aka Greg) has the challenging task of looking towards the emerging Cyber Threats and the future challenges of CyberSecurity by contributing his combined hands-on experience from advanced security services, penetration testing and security research. He has a number of publications in the area of Computer Security and Computer Forensics with active research in CyberSecurity and CyberDefence. His R&D background in Information Security, along with his experience in the CyberDefense department of the military, is invaluable when it comes to safeguarding critical infrastructures and especially for the PCI DSS. Grigorios has been invited to present in a number of security conferences, workshops and summits over the years. Thinking ahead and outside-the-box when dealing with information security challenges is one the key characteristics of his talks.</p>
<a href="https://twitter.com/drgfragkos" target="_blank"><p class="small itemIcon"><i class="fa fa-twitter"></i> drgfragkos</p></a>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#Memory" aria-expanded="true" aria-controls="Memory">
Live Analysis of Volatile Memory
</a>
</h4>
</div>
</div>
</div>
<div id="Memory" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Memory forensics has become a cornerstone of security investigations - whether it be Police running forensics on a confiscated machine or an organisation launching a response to a security incident, an image of a suspect device’s hard drive is normally taken as a matter of course.<br />There is now malware out in the wild which is present only in volatile memory for much of it's lifespan. This presents a whole new set of problems to the forensic process, not least of which are the security systems in place within an OS to control memory access.<br />This talk covers a project investigating the potential for live monitoring of RAM while a system is running normally. An overview of the challenges of volatile memory analysis will be given, along with the ways these can be overcome. We'll also have a look at any interesting data I've come across during the project which it shouldn't be possible to see normally.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin"/>
<h5>About Peter Cowman</h5>
<p class="small">I am a 3rd year Ethical Hacking student at Abertay. I find particular interest where the cyber and real worlds meet, having previously done projects on Industrial Control Systems and Engine Control Units within the remit available without building a power station. I am also a keen programmer.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 13-45 TIMESTAMP -->
<div class="shed-dark shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">13-45</p>
</div>
<!-- T1 Snowden -->
<div class="panel shed-dark panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#woopwoop" aria-expanded="true" aria-controls="Police">
Police Scotland
</a>
</h4>
</div>
</div>
</div>
<div id="woopwoop" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Snowden Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">In an informal engaging collaborative approach this is Police Scotland highlighting the threat of Serious and Organised Crime gangs (SOCG’s) who are principally eastern European based attacking UK and Scottish industry. This will include DDOS, malware proliferation, ransomware, radicalisation on line Cyber terrorism and social media abuse.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin"/>
<h5>About Eamonn Keane</h5>
<p class="small">Detective Inspector Eamonn Keane has worked with the Irish and Scottish Police for 31 years principally in the investigation of terrorism, serious crime, criminal investigation, public protection and community partnership policing. He has served and led on many high profile national cases and in all aspects of criminal enquiries particularly serious and sexual crime investigation, sex offender management and public protection. His current portfolio with the Specialist Crime Division, Cybercrime, Police Scotland, investigates all aspects of serious and organised crime across Scotland with particular emphasis on technology facilitated crime to include malware proliferation, child sexual exploitation, drug supply, paedophilia, cybercrime, ICT facilitated fraud and social network abuse.</p>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel shed-dark panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#AppCL" aria-expanded="true" aria-controls="AppCL">
AppCL LSM - A Linux kernel security module to implement application oriented access controls.
</a>
</h4>
</div>
</div>
</div>
<div id="AppCL" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">The talk will cover three main areas. </p>
<ul class="abstract">
<li>
Looking at the issues with current user oriented access controls (ACL's), and discussing the added benefit of application oriented access controls (PACL's). This is to prevent applications inheritting the privileges of the user that runs them.
</li>
<br />
<li>
The Linux Security Module (LSM) framework and how it allows development of additional kernel level security. Current Mandatory Access Controls (MAC) solutions, such as SELinux, use this framework.
</li>
<br />
<li>
AppCL LSM - Linux kernel security module built using the LSM framework. I will discuss how AppCL uses the LSM framework to implement an application oriented access control proof of concept. This is the subject of my final year project at Leeds Beckett University, studying BSc (Hons) Computer Forensics and Security.
</li>
</ul>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin"/>
<h5>About James Johnson</h5>
<p class="small">Bio coming soon</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 12-00 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">14-45</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#breakone" aria-expanded="true" aria-controls="LunchOne">
Break
</a>
</h4>
</div>
</div>
</div>
<div id="breakone" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p><a href="https://www.youtube.com/watch?v=PHdU5sHigYQ" target="_blank">Take five!</a> ... or fifteen.</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">15 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Wherever you want!</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 15-00 TIMESTAMP -->
<div class="shed-dark shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">15-00</p>
</div>
<!-- T1 Snowden -->
<div class="panel shed-dark panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#blue" aria-expanded="true" aria-controls="BlueIsTheNewRed">
Blue is the new Red
</a>
</h4>
</div>
</div>
</div>
<div id="blue" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Snowden Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Time and time again we hear people (in the community) saying they want to be a network intrusion analyst, incident handler, or work in a SOC with the end goal of working up to being a pen tester in a few years. When you consider the traditional image of defensive security: a SOC, full of analysts staring at screens and answering phones, responding to alerts and not truly understanding the full situation; it quickly becomes clear why people have the mind-set that defensive security is easy and plain straight boring. But is there more to it than that?<br />In this talk we’ll try to clear up the distinguishable differences between offensive and defensive security, and explore some of the different roles that exist in each. Furthermore, we’ll try to highlight how important different skills are to both offensive and defensive security, but also how they can actually be used to complement each other too. (Improving your offensive skills may just improve your defensive capability too, and vice versa) Most importantly however, we’ll discuss a different image of defensive security, one that attracts people to join, with interesting opportunities, and doesn’t act as a stepping stone into offensive roles as it currently does.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin"/>
<h5>About Matt Watkins & Hamza Beghal</h5>
<p class="small">Matt Watkins is a Network Intrusion Analyst at Countercept, and has an interest in both offensive and defensive security. Matt has been involved in the Cyber Security Challenge UK for a number of years, and is a founding member of the alumni group: the Whitehatters Academy. When not at his computer, he’s AFK.<br />Hamza Beghal is also a Network Intrusion Analyst at Countercept. He graduated a year ago with a degree in Computer Security & Forensics.</p>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel shed-dark panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#bgp" aria-expanded="true" aria-controls="BGP">
Blackholing the Internet: A Live Demo
</a>
</h4>
</div>
</div>
</div>
<div id="bgp" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">BGP is pretty old. It’s also very (very) trusting! This talk examines the current state of the BGP routing protocol and analyses different attack vectors against it. Looking at real life examples of recent BGP attacks, I will be attempting to replicate and demonstrate these attacks inside a virtual network, live, in real-time. Please make a sacrifice to the Demo Gods on your way in!</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin"/>
<h5>About Adam Rapley</h5>
<p class="small">
Ethical Hacker, Web Designer, Artist & Musician.
<br />
Spends time hopping on and off planes or playing collections of various sounds.
Climbed a couple of hills once. Also built the website you're looking at.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 16-00 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">16-00</p>
</div>
<!-- T1 Snowden -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title">
<a data-toggle="collapse" data-parent="#accordion" href="#box" aria-expanded="true" aria-controls="BlueIsTheNewRed">
Am I living in a box?
</a>
</h4>
</div>
</div>
</div>
<div id="box" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Snowden Content -->
<div class="panel-body">
<div class="row">